Primary Goal of IoT Attack Models
Nampally Vijay Kumar1, Vahini Siruvoru2, Naresh Kumar Sripada3, Komuravelly Sudheer Kumar4
1Nampally Vijay Kumar, Assistant Professor, Department of CSE, S R Engineering College, India.
2Vahini Siruvoru, Assistant Professor, Department of CSE, S R Engineering College, India.
3Naresh Kumar Sripada, Assistant Professor, Department of CSE, S R Engineering College, India.
4Komuravelly Sudheer Kumar, Assistant Professor, Department of CSE, S R Engineering College, India.
Manuscript received on 14 June 2019 | Revised Manuscript received on 10 July 2019 | Manuscript Published on 17 July 2019 | PP: 216-220 | Volume-8 Issue-1C2 May 2019 | Retrieval Number: A10360581C219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: A common understanding of IoT is that it uses countless solutions in several domains, making use of traditional internet framework by allowing various interaction patterns such as human-to-object, object-to-objects, and also object-to-object. Incorporating IoT things right into the typical Internet, nevertheless, has actually opened numerous safety obstacles, as many internet technologies and also connection procedures have actually been specially made for uncontrolled items. The IoT is getting boosting focus. The total purpose is to adjoin the physical with the electronic globe. Consequently, the real world is determined by sensors and also converted right into processible information, as well as information needs to be equated right into commands to be performed by actuators. Because of the expanding passion in IoT, the variety of platforms made to sustain IoT has actually climbed significantly. As an outcome of various methods, requirements, and also make use of situations, there is a wide range and also diversification of IoT platforms This results in problems in understanding, choosing, as well as utilizing proper platforms. In this job, we take on these problems by performing an in-depth evaluation of numerous advanced IoT platforms.
Keywords: Security and Privacy; Internet of Things (IoT); Reference Model, Mechanical Engineers.
Scope of the Article: IoT